Sciweavers

19010 search results - page 3680 / 3802
» Adapting to adaptive testing
Sort
View
140
Voted
ATAL
2010
Springer
15 years 4 months ago
Planning against fictitious players in repeated normal form games
Planning how to interact against bounded memory and unbounded memory learning opponents needs different treatment. Thus far, however, work in this area has shown how to design pla...
Enrique Munoz de Cote, Nicholas R. Jennings
114
Voted
ATAL
2010
Springer
15 years 4 months ago
Multi robotic exploration with communication requirement to a fixed base station
d Abstract) Piyoosh Mukhija IIIT Hyderabad Rahul Sawhney IIIT Hyderabad K Madhava Krishna IIIT Hyderabad We present an algorithm for multi robotic exploration of an unknown terrai...
Piyoosh Mukhija, Rahul Sawhney, K. Madhava Krishna
122
Voted
ATAL
2010
Springer
15 years 4 months ago
Decentralized hash tables for mobile robot teams solving intra-logistics tasks
Although a remarkably high degree of automation has been reached in production and intra-logistics nowadays, human labor is still used for transportation using handcarts and forkl...
D. Sun, A. Kleiner, Christian Schindelhauer
102
Voted
ATAL
2010
Springer
15 years 4 months ago
Worst-case efficiency ratio in false-name-proof combinatorial auction mechanisms
This paper analyzes the worst-case efficiency ratio of falsename-proof combinatorial auction mechanisms. False-nameproofness generalizes strategy-proofness by assuming that a bidd...
Atsushi Iwasaki, Vincent Conitzer, Yoshifusa Omori...
120
Voted
BLISS
2009
IEEE
15 years 4 months ago
Mechatronic Security and Robot Authentication
Robot Security is becoming more and more a serious issue for many modern applications. Robot Security matters are still not intensively addressed in the published literature. The ...
Wael Adi
« Prev « First page 3680 / 3802 Last » Next »